Home » Cyber » Cyber Security Center » Biometrics seen as password replacement for DoD networks

Biometrics seen as password replacement for DoD networks

by Mike Hoffman on February 22, 2013

FORT LAUDERDALE, Fla. — U.S. soldiers future identification cards will have biometrics, or human identification traits, stored within the card to more easily identify the individual, said Jon Campbell, an official with SRI International, an independent research institute.

The Pentagon has explored ways to replace the CAC card or figure out new ways to identify troops. Most U.S. servicemembers have to use their CAC cards to use their computers and gain access to classified military networks.

Campbell said that biometrics will eventually replace passwords for the most secured networks. U.S. troops who have deployed to Iraq and Afghanistan have already learned about biometrics as the military has used iris scanners to collect maintain databases of potential insurgents in both deployed locations.

Iris scans are the most secure manner to identify a person, Campbell said. It’s the hardest personal identification code to copy — harder than a finger print or facial recognition, he said Thursday in a presentation at the Association of the U.S. Army’s Winter Symposium here.

Campbell, a retired servicemember, admitted there were times he would borrow other identification badges to swipe into the Pentagon when he would forget these. If the Pentagon instead used iris scanners, which would necessitate individuals only look into a mirror, it would better protect secured buildings and keep anyone from having to drive home to pick up a forgotten identification badge, Campbell said.

He didn’t anticipate the Defense Department getting rid of CAC cards any time soon, but Campbell said the CAC cards could easily store biometrics that could be used to gain access to specific secured buildings or classified networks.

The Defense Advanced Research Projects Agency has already started research in ways to replace the password with biometrics to log onto computers. Called the Active Authentication program, DARPA has started to reach out to software firms to find ways to allow soldiers to access their computers simply by using biometrics signatures.

Share |

{ 30 comments… read them below or add one }

Tad February 22, 2013 at 12:16 pm

Having this information safely in the hands of the government is not at all concerning, of course, but what if the biometric database gets hacked by some group like "Anonymous"? Or released to WikiLeaks by some misguided private who somehow has access to everything everywhere on SIPRNet?

Reply

Nathan S February 23, 2013 at 4:10 am
Restore Palestine February 23, 2013 at 11:55 pm

The RSA public key encryption was once regarded as secure (by virtue of unrealistically long time required to decrypt). Do you know what happened to the claim?

Reply

Rock n Roll February 23, 2013 at 9:12 am

Biometrics have been in use for a while now. Worked for a company that used fingerprint scans for door access to just about everything. There were even a few retina scans scattered about.

The database would probably be airgapped from the rest of the net. And even if it was hacked, they'd get nothing useful enough to gain access to anything.

The best part about biometrics is that you actually need the finger or eye or whatever physical form of evidence needed.

Reply

Restore Palestine February 23, 2013 at 11:51 pm

you are so brainwashed by government's propaganda.

sad.

Reply

GroUpFolks February 25, 2013 at 10:01 am

What an intelligent response, worked on it long?

Reply

blight_ February 22, 2013 at 3:03 pm

Store unique hard-to-replicate information from the iris on an easy-to-steal card? Did I read this right?

Many laptops have a fingerprint scanner. Will the next secured enterprise machine require an Iris scanner to log in?

Reply

YeahIWentThere February 23, 2013 at 2:38 pm

No it will require a semen sample.

Reply

whatever February 23, 2013 at 11:49 pm

live or frozen?

how many? (concentration?)

what if the semen count is too low? (can't use the computers?)

Reply

Dixson February 25, 2013 at 9:49 am

I find it amazing that a former 'servicemember'
( Campbell, an official with SRI International, an independent research institute.)
tries to peddle a product to the government by stating that he supposedly broke the UCMJ by using another servicemember's id card to get into the Pentagon.

"Campbell, a retired servicemember, admitted there were times he would borrow other identification badges to swipe into the Pentagon when he would forget these (sic)".
Either he's lying, or he's a cheater. Either way, I wouldn't trust his 'endorsement' of this product. He's an opportunist.

Reply

blight_ February 25, 2013 at 11:14 am

Indeed, most enterprise operations that use ID cards have a security desk that can walk you through or give you a guest ID card without having to borrow cards to circumvent security.

Waiting for iris scan devices to log onto machines. My Samsung Galaxy S3 has some kind of face recognition system for logins, but I imagine it can be easily spoofed.

Reply

resmed vpap July 23, 2014 at 8:04 am

Hello, all is going perfectly here and ofcourse every one is sharing facts, that’s
truly fine, keep up writing.

Reply

La Planète des singes l'affrontement gratuit July 26, 2014 at 3:32 am

One or more projectors are used to process programs.

The style of a well used movie theater can be carried

out using the structural arranging as part of your room.

With Luigi Lo Cascio, Catrinel Marlon, Luigi Maria Burruano.

Reply

Stephan July 26, 2014 at 6:05 am

xbox 360 emulator for windows 7 no survey

Reply

Jacinto July 26, 2014 at 5:49 pm

I am reallʏ grateful tօ the holder оf this site whօ has shared tɦis ɡreat
article at at this place.

Reply

skype customer service July 27, 2014 at 1:58 am

They can be happening for a number of reasons,
but the most common ones are software bugs. Skype uses its
own proprietary method of communication there have been some attempts to generate
video gateways from video conference rooms to Skype clients but all have had limited success maybe things will change on this front with the Microsoft acquisition of Skype Resolver
Grab Any IP Software Resolve although they may well tighten up further and only enable
Skype to assist their own Lync offering. Besides fixing runtime error R6016, it will remove any registry errors, invalid shortcuts,
duplicate files and repair no matter EXE or DLL files, like
Psapi.

Reply

Anthony July 27, 2014 at 7:13 am

Their should be more finger print scan for computers,for classifieds and higher,stemcell analizer!!

Reply

ยาเพิ่มขนาดชาย July 28, 2014 at 11:11 pm

I have read so many articles or reviews
regarding the blogger lovers except this paragraph is genuinely a pleasant paragraph,
keep it up.

Reply

Tod July 29, 2014 at 11:26 am

I’m not sure exactly why but this website is loading extremely slow for me.
Is anyone else having this issue or is it a problem on my end?
I’ll check back later on and see if the problem
still exists.

Reply

Hip Hop News July 30, 2014 at 12:25 am

Have you ever considered writing an ebook or guest authoring
on other sites? I have a blog based upon on the
same ideas you discuss and would love to have you share some stories/information. I know my
viewers would enjoy your work. If you’re even remotely interested,
feel free to shoot me an e mail.

Reply

www.aguaverdeacuicultura.com July 30, 2014 at 9:21 pm

The main goal of these devices is voice communication; however through
data plans and web applications, users can have unlimited access to the
web. PDF may contain XFA (in XDP format),
but also XFA may contain PDF. This would include your name and title or tag line,
as appropriate, phone number, website, and email address.

Reply

Willis July 31, 2014 at 9:23 am

Nice blog here! Also your site loads up fast! What web host are you using?
Can I get your affiliate link to your host? I wish my site loaded up as
fast as yours lol

Reply

mold restoration July 31, 2014 at 8:55 pm

Hi there i am kavin, its my first occasion to commenting
anyplace, when i read this paragraph i thought i could
also create comment due to this brilliant piece of writing.

Reply

Tracey August 1, 2014 at 1:58 am

It’s impressive that you are getting thoughts from
this post as well as from our dialogue made at this place.

Reply

Jen R February 25, 2013 at 10:43 am

You are either a complete moron or someone who never served a day in the military, With people like you it makes someone like myself wonder why we even fight for retards like yourself? Ever wonder why the US defense is still the best in the world ? It is because of our Government and the people who run it. If you do not like it do something about it besides flapping your gums with idiot comments or go live in another country if it so bad in the US.

Reply

Restore Palestine February 25, 2013 at 1:02 pm

What an uninformed, ignorant fool. But then that's why you are in the military, a place for people who are high on drugs and hormones and miserably low on brains. Killing civilians in Iraq and Afghanistan isn't defending freedom of speech or America, moron! Bullying defenseless Palestinians on behalf of Israel is something to be ashamed of.

It has been reported that the suicide rate among those who served in Iraq and Afghanistan is still on the rise. I wonder whether that's because of regret and remorse. I don't know when you will wise up, if ever, but I wouldn't mind if you join them right away without wising up first. It will definitely help increase the low average IQ of Americans.

Reply

A Friend? February 25, 2013 at 9:38 pm
A Friend? February 25, 2013 at 9:39 pm
Restore Palestine February 27, 2013 at 2:16 am

I meant to say that my credibility should NOT be an issue for those who are well-read and well-informed.

Reply

Restore Palestine March 1, 2013 at 1:04 am

Looks like you have not been in the mood of babbling nonsense the past few days. Hope you are in the mood of reading. Here is a good news article:
http://www.commondreams.org/headline/2013/02/28-4

Read and Learn, Jen R.

Reply

Leave a Comment

Previous post:

Next post: